Unlock instant, AI-driven research and patent intelligence for your innovation.

A privacy protection method and system for friend matching based on mobile social network second-degree contacts

A mobile social network, privacy protection system technology, applied in the computer field, can solve problems such as limited application scope, difficulty in finding friends with common characteristics, and unstable circle of friends

Active Publication Date: 2020-11-06
上海炎颂信息科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Although the above solutions solve the credible problem of making friends to a certain extent, they still belong to strangers making friends. Therefore, in actual application scenarios, there are situations where the circle of friends making friends is unstable; in addition, the above solutions do not fully integrate the mobile social network. Features, taking into account the user's actual location information, so the scope of application is relatively limited, for example, when the user changes the location of making friends, it may be difficult to find friends with common characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection method and system for friend matching based on mobile social network second-degree contacts
  • A privacy protection method and system for friend matching based on mobile social network second-degree contacts
  • A privacy protection method and system for friend matching based on mobile social network second-degree contacts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] The method of the present invention includes three stages: the first stage, the negotiating stage of the mandatory attribute key; the second stage, the decryption stage of the optional attribute; the third stage, the vector similarity calculation stage. The security basis of this method is based on the Chinese remainder theorem and the large prime encryption security framework recognized by cryptography.

[0074] Alice, the dating initiator: has all the rights to set files that match the property settings.

[0075] Friend requester Bob, Tom: Only when the required attributes and location information of the friend requester meet the requirements of the configuration file set by Alice can the correct decryption key be calculated, and then the file can be decrypted to carry out further social activities.

[0076] The first phase, mandatory attribute key negotiation phase

[0077] At this stage, Alice first starts the App application installed on the smartphone, and sets t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a friend matching privacy protection method and system based on the second-level network of a mobile social network, and the method comprises the steps: dividing user feature attributes into required attributes and optional attributes; carrying out the secret key negotiation through the required attributes and optional attributes of a making-friends sponsor and a making-friends responder, wherein only a making-friends requester who achieves the successful negotiation can enter a next precise optional attribute matching stage; solving the similarity of the feature attributes between two sides through the inner product of vectors, wherein the making-friends requester can serve as an agent for transferring a matched file, thereby extending the second-level network. Themethod employs the Chinese remainder theorem for mode calculation and secret key calculation, and each making-friends user manages the secret key by himself, so the method can effectively reduce thesecret key leakage risks of a single-attribute center, and also reduce the calculation expenditure in a matching process. For the matching of a personal attribute configuration file, the method guarantees the privacy of the user through the introduction of vector calculation and big prime number fuzziness while guaranteeing the precise matching.

Description

technical field [0001] The invention belongs to the field of computers, and in particular relates to a privacy protection method and system for friend matching based on mobile social network second-degree contacts. Background technique [0002] With the popularity of mobile terminal devices, mobile social networks (MSN) have developed rapidly. Through mobile social networks, people have a broader communication platform, meet new friends, and further expand their social scope. . For example, WeChat, Zhiquan, etc. that accompany us in our daily life. [0003] Users can find friends with common characteristics in the mobile social network by performing similarity matching on their own characteristic attributes. These characteristic attributes can include user identity, location, hobbies, etc.; The risk of information being leaked mainly includes: location privacy leak, identity privacy leak, data privacy leak, medical data privacy leak, etc. Once user privacy is leaked, it m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q50/00H04L9/08
CPCG06Q50/01H04L9/0838H04L9/085
Inventor 罗恩韬尹向东张彬李连胜
Owner 上海炎颂信息科技有限公司